Grade 3


The Big Idea

Some basic concepts such as community and people in a community need to be reinforced. They need to understand the difference between a stranger and a trusted adult. At this point, the relationship between a real community and a virtual community should be connected. It should be emphasized that students should always use an adult while going online and differentiate what it means to feel safe versus unsafe.


Key Terms


Review Terms
Community: the area where we live, with places where we know real people.
Cyber Community: a website where we visit, learn, play games, create virtual characters/pets/friends
Cyber Citizen: People who actively participate in a cyber community
Cyber Smart: Making good choices when in a cyber community
Responsible Citizen: A person who uses their cyber smarts
Trusted Adult: A parent, teacher, or guardian
Email: A service that allows people to send messages with pictures and sounds from their computer to any other computer in the world. To send someone an e-mail message you need an e-mail account and to know the other person's e-mail address.
Virus-A computer program that can destroy files or make your computer "crash." Viruses can be sent via e-mail or through other file-sharing programs. Anti-virus software and not downloading information from people you don't know can help keep viruses from damaging your computer.
File - Anything that can be saved on your computer
Attachment- This is a file that has been added to an e-mail. It could be something like a photograph or a clip of your favorite song. It could be something harmful to your computer, like a virus. Remind children to never open an attachment or e-mail from someone they don't know.

New Terms
Intellectual Property- refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.
Pirates- People who take things that belong to others from the Internet without asking permission.
Spam- Unwanted e-mail from someone you don't know. It is usually trying to sell you something.
Plagiarism- The act of copying someone's work and claiming it as their own



Activities & Lessons

(You might need to scroll down the page to locate the activities and videos)

1. Cyber Community


Concepts
  • Place in communities are identified by addresses.
  • An Internet address is called a URL.
  • Terminology introduction and discussion: appropriate and inappropriate
  • Inappropriate places in the community, and on the Internet, are described as places that are not suitable for kids.
  • Concept introduction: inappropriate equals unsafe.
  • Age-appropriate descriptions of inappropriate websites
  • Concept introduction: inappropriate website can be accessed through e-mail.
  • E-mail is a way people communicate online by sending written letters.
  • Appropriate e-mail is a fun way to communicate with people you know.
  • Even if e-mail is not used very much yet at this age, the important thing to remember is that students should follow the rules for Internet and e-mail use that parents have established.
  • Age-appropriate strategy to get out of inappropriate websites is described as:
    • Click the ‘X’ (close box) in the corner of the web page.

Discussion
  • What are some of the dangers in a cyber community?
  • How can one protect themselves from online dangers?
  • What are some things we can do to promote good cyber citizenship?
  • How can email impact us in a positive way? Negative way?

Activity:Know The Rules- Check First(Scroll down and download the lesson plan)
Video: Know the Rules Rap Video




2. Cyber Security


Concepts
  • Terminology introduction and discussion: attachment
  • Concept introduction: there are laws and consequences governing people who invent viruses.
  • Terminology introduction and discussion: prevent, used in conjunction with how to protect the computer from viruses.
  • Never click on flashing banners or pop-up windows on your computer screen without consenting an adult first

Discussion
  • What do you do if you see a flashing banner on your screen? Pop up window?
  • What should you do if you received an unrecognized email?
  • What are some of the consequences someone might face if they open an email with a virus?

Activity: Don't Open That File!(Scroll down and download the lesson plan)
Video: Don't Open that File!




3. Personal Safety


Concepts
  • Concept expansion: definition and discussion of the term trusted adult
  • Discuss the importance of rules and laws
  • Strategy reinforced: students should have adult assistance when using the Internet
  • Never give out your password to anyone
  • Never give out your personal information such as (last name, address, phone number, etc)

Discussion
  • What is the difference between appropriate & inappropriate?
  • What does it mean to feel unsafe? Discuss ways to respond to feeling unsafe.
  • What are some consequences a person might face if a person had access to their password?
  • What are some of the dangers one might face when surfing the Internet?
  • How might someone protect themselves, or keep safe online?

Video: Meet The Wizzy Wigs
Video:Which Wizzy Wig is Which?
Video: Rapmania (What to do if you run into a Wizzy Wig)



4. Intellectual Property

(See copyright page for rules & fair use guidelines)
  • Create a comparison chart of tangible property to Intellectual Property
  • Identify material which qualifies as Intellectual Property
    • music, art, poetry, writing, video
  • Create and share guidelines about using Intellectual Property
    • How do we use the work of others without "taking it"?
  • "Just because it's online, doesn't mean it's free!"
  • Copying someone's work on the Internet is illegal
  • Just because no one is watching does not give YOU the right to take it!

Discussion
  • How do you know if someone's work online becomes Intellectual Property?
  • What are some ways you can protect yourself from piracy?
  • What would you do if you noticed someone illegally downloading music

Video: **Clicky's Stolen Song: A Lesson in Digital Ethics** (scroll down to find it)



5. Cyberbullying

Concepts
There are 4 types of online bullies:
  • The Vengeful Angel
  • The Power-Hungry or Revenge of the Nerds
  • The “Mean Girls”
  • The Inadvertent Cyberbully or “Because I Can”

Not mentioned above: "The Bully Who Looks The Other Way" and does nothing...

Discussion:
  • What are some signs that someone might be bullying online?
  • What are some steps you can take if you notice someone bullying?

Activities: Review the 4 types of online bullies. Assign students into small groups and have them role play a scene where they can identify one of the 4 types of bullies mentioned above. Have the other students guess which bully scenario they are trying to role play. It might be helpful to print out the activity and cut them up into activity cards to handout. Discuss steps they can take to avoid cyberbullying. This is a great activity to repeat and discuss more than once.